Publication | Date of Publication | Type |
---|
An efficient IoT forensic approach for the evidence acquisition and analysis based on network link | 2023-02-16 | Paper |
CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones | 2022-10-14 | Paper |
WOTS-S: a quantum secure compact signature scheme for distributed ledger | 2021-11-23 | Paper |
Blockchain-based system for secure outsourcing of bilinear pairings | 2021-04-19 | Paper |
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data | 2020-12-10 | Paper |
Game theoretic security of quantum bit commitment | 2020-10-07 | Paper |
Jo-DPMF: differentially private matrix factorization learning through joint optimization | 2020-09-22 | Paper |
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving | 2020-05-06 | Paper |
Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks | 2019-12-10 | Paper |
Neighbor-considered migration facilitates cooperation in prisoner's dilemma games | 2019-06-21 | Paper |
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud | 2019-04-29 | Paper |
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks | 2019-03-27 | Paper |
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps | 2019-03-27 | Paper |
Context-oriented web application protection model | 2019-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4639666 | 2018-05-11 | Paper |
Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification | 2018-02-23 | Paper |
Two-round password-only authenticated key exchange in the three-party setting | 2017-09-27 | Paper |
Secure outsourcing of modular exponentiations under single untrusted programme model | 2017-09-15 | Paper |
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases | 2017-09-07 | Paper |
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols | 2017-02-07 | Paper |
Towards Lightweight Anonymous Entity Authentication for IoT Applications | 2016-08-31 | Paper |
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy | 2016-08-31 | Paper |
On Lightweight Security Enforcement in Cyber-Physical Systems | 2016-02-22 | Paper |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode | 2010-03-03 | Paper |
An improved identity-based key agreement protocol and its security proof | 2009-03-24 | Paper |
Secure key establishment | 2008-10-29 | Paper |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension | 2008-06-24 | Paper |
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication | 2008-06-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5459552 | 2008-04-29 | Paper |
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols | 2008-03-18 | Paper |
Errors in Computational Complexity Proofs for Protocols | 2008-03-18 | Paper |
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys | 2007-09-07 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q3431075 | 2007-04-05 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |